Search spam analysis and detection

a search spam and analysis technology, applied in the field of search spam analysis and detection, can solve the problems of search spam putting a burden on the web, search spam traffic can be significant, and certain consumer product sellers bear a disproportionate burden of illicit search spam activity

Active Publication Date: 2011-04-14
MICROSOFT TECH LICENSING LLC
View PDF52 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As most search spammers spam for profit, certain consumer product sellers bear a disproportionate burden of illicit search spam activity.
Further, search spam places a burden on the web.
Search spam traffic can be significant and search spam decreases search efficiency.
In addition, search spammers divert advertising money from legitimate advertising service providers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Search spam analysis and detection
  • Search spam analysis and detection
  • Search spam analysis and detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

lf-monitoring components.

[0009]FIG. 5 is a diagram of an exemplary spam verifier component that uses one or more techniques to verify a spam URL and to optionally output one or more lists or groups of URLs.

[0010]FIG. 6 is a diagram of an exemplary search ranger system and some associated methods.

[0011]FIG. 7 is a diagram of an exemplary spam detection method.

[0012]FIG. 8 is a diagram of an exemplary method that uses an anti-cloaking technique for URLs that use click-through cloaking.

[0013]FIG. 9 is a diagram of an exemplary double-funnel model for analyzing spam and for identifying entities involved in spam.

[0014]FIG. 10 is a diagram of various components of an exemplary computing device that may be used to implement various exemplary methods discussed herein.

DETAILED DESCRIPTION

[0015]As mentioned in the background section, the problem of search spam is not new. Search spam has traditionally been modeled as an information retrieval and relevance ranking problem. For example, convent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Defeating click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. Investigating cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script.

Description

RELATED APPLICATIONS[0001]This application is a divisional application of, and claims priority to, U.S. patent application Ser. No. 11 / 756,603, filed on May 31, 2007, entitled “Search Ranger System and Double-Funnel Model for Search Spam Analyses and Browser Protection,” the entire disclosure of which is incorporated herein by reference. This application is related to U.S. patent application Ser. No. 11 / 696,580, filed Apr. 4, 2007, entitled “Cybersquatter Patrol,” now U.S. Pat. No. 7,756,987, the entire disclosure of which is incorporated herein by reference.BACKGROUND[0002]Search spammers (or web spammers) spam web users via techniques that cause search engines to rank their links, undeservedly, amongst top search results. Search spammers typically target commerce search queries that include keywords of well-known brands, high demand consumer products, etc. For example, spam targeted keywords include generic terms such as handbag and ringtone as well as trademarks such as GUCCI® an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F17/30
CPCG06F21/56G06F2221/2119H04L63/1416H04L63/0227H04L12/585H04L51/212
Inventor WANG, YI-MINMA, MING
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products